Lucene search

K
securityvulnsCERTSECURITYVULNS:VULN:3628
HistoryMay 21, 2004 - 12:00 a.m.

TCP RST packets spoofing

2004-05-2100:00:00
CERT
vulners.com
27

By sending spoofed RST it's possible to terminate established TCP connection. unlike TPC hijacking attacks there is no need for exact TCP sequence number, and number can be any number from handshaked TCP window. It significantly increases attack efficiency. In NetBSD sequence number for RST is not checked at all, it makes it possible to terminate session with single packet.

Rows per page:
1-10 of 331